Cryptography: Public Keys, Private Keys, and SSL

What is the difference between Symmetric and Asymmetric Encryption?
Table of Contents
Data security is highly tested in Paper 1. Understanding how internet banking stays secure requires you to know exactly how Public and Private keys interact. This guide from our Ultimate O-Level Computer Science Guide explains the progression from fast-but-flawed algorithms to unbreakable web security.
1. Plaintext vs Ciphertext
Before diving into keys, you must use the correct examiner vocabulary. Data that can be read naturally by humans or computers (like a password 'secret123') is called Plaintext.
Through an encryption algorithm, this is scrambled into meaningless garbage (like 'X9$qPZ!2'). This scrambled version is strictly called Ciphertext.
2. The Flaw of Symmetric Encryption
In Symmetric Encryption, the sender and receiver use the exact same key. Think of it like a physical padlock and a single key. You put a message in a box, lock it with the key, and mail it to a friend.
The Key Distribution Problem
When your friend receives the box, they can't open it because you have the key. If you put the key in an envelope and mail it to them, a hacker (man-in-the-middle) can intercept the mail, copy the key, and read all your future messages. Symmetric encryption is fast, but sharing the secret key across the open internet is extremely unsafe.
3. The Asymmetric Key Pair Solution
Asymmetric encryption fixes the distribution problem by using mathematical Key Pairs. There are two keys that belong to the receiver (let's say, your Bank).
- The Public Key: The Bank gives this key away for free on their website to anyone in the world. Its ONLY job is to encrypt data. It physically cannot decrypt data.
- The Private Key: A highly secured key held deep inside the Bank's servers. Its ONLY job is to decrypt data that was locked by its sibling Public Key.
The Process: You want to send your password to the Bank. You download their Public Key. You use it to encrypt your password. The ciphertext flies across the internet. Even if a hacker intercepts it, and even if they have the Public Key, they can't read the message! The only thing on Earth that can pry the message open is the Bank's protected Private Key.
4. How SSL/TLS Combines Both Methods
In reality, downloading entire movies using Asymmetric Encryption would take hours because the math is so heavy. When you connect to an HTTPS website, your browser actually uses BOTH methods.
- First, your computer and the server use Asymmetric Encryption to safely send a small, temporary Symmetric Key to each other over the internet.
- Now that both sides safely hold the same secret Symmetric Key, they throw away the slow Asymmetric keys.
- They use the ultra-fast Symmetric Key to encrypt and decrypt the rest of the actual website data (videos, images) for the rest of the session.
Frequently Asked Questions
What is Symmetric Encryption?▼
Why is Symmetric Encryption risky over the internet?▼
How does Asymmetric Encryption work?▼
What does a Digital Certificate do?▼
Stop Guessing, Start Scoring
Get instant access to 500+ CAIE-aligned practice questions, worked solutions, and AI-powered mock exams across all O-Level subjects.